Using an information model and associated ontology for selection of policies for conflict analysis

Steven Davy, Brendan Jennings, John Strassner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Citations (Scopus)

Abstract

We present an analysis process targeting identification of potential policy conflicts within sets of policies relating to multiple network devices and the security services deployed on them. The process targets pre-deployment identification of potential conflicts between a newly created (or modified) policy and already deployed policies. It employs an algorithm which, with the aid of an ontology, selects the relevant subset of policies that should be compared with the "candidate" policy, together with an algorithm that identifies the relationships between a given pair of policies and compares these to a conflict signature pattern encoded in an information model. Operation of the process is illustrated via a scenario describing how it can identify conflicts between firewall filtering policies and IPSec VPN policies that are deployed on different network devices.

Original languageEnglish
Title of host publicationProceedings - 2008 IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008
Pages82-85
Number of pages4
DOIs
Publication statusPublished - 2008
Event9th IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008 - Palisades, NY, United States
Duration: 02 Jun 200804 Jun 2008

Publication series

NameProceedings - 2008 IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008

Conference

Conference9th IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008
Country/TerritoryUnited States
CityPalisades, NY
Period02/06/200804/06/2008

Fingerprint

Dive into the research topics of 'Using an information model and associated ontology for selection of policies for conflict analysis'. Together they form a unique fingerprint.

Cite this